Lecture Data security and encryption - Lecture 27: Malicious Software

The contents of this chapter include all of the following: problem of intrusion, behavior and techniques; intrusion detection (statistical & rule-based); password management; various malicious programs; trapdoor, logic bomb, trojan horse, zombie; viruses; worms; distributed denial of service attacks. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious concern, and are perhaps the most sophisticated types of threats to computer systems. We begin with a survey of various types of malware, with a more detailed look at the nature of viruses and worms. We then turn to distributed denial-of-service attacks. Malicious Software The terminology used for malicious software presents problems because of a lack of universal agreement on all terms and because of overlap. Stallings Table , and this diagram from 3/e, provide a useful taxonomy. It can be divided into two categories: those that need a host program (being a program fragment eg virus), and those that are independent programs (eg worm); alternatively you can also differentiate between those software threats that do not replicate (are activated by a trigger) and those that do (producing copies of themselves). Will now survey this range of malware. Malicious Software The terminology used for malicious software presents problems Because of a lack of universal agreement on all terms | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 27 Review have considered: problem of intrusion, behavior and techniques intrusion detection (statistical & rule-based) password management Chapter 20 summary. Chapter 21 – Malicious Software Opening quote. Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though This chapter examines malicious software (malware), especially viruses and worms, which exploit vulnerabilities in computing systems. These have been given a lot of (often uninformed) comment in the general media. They are however, of serious .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
187    25    1    28-11-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.